A method is provided for authenticating debit card transactions engaged in by a cardholder on a communications network. The method includes: a) establishing a connection over the network with a client being used by the cardholder to engage in a transaction on the network; b) providing over the connection to the client a web page containing a keypad (22) having a plurality of buttons (24) that collectively define a geometry of the keypad (22), the keypad (22) being employed by the cardholder to enter a PIN via selection of the buttons (24) with a pointing device of the client; c) obtaining over the connection the PIN enter by the cardholder; d) determining if the obtained PIN is correct for a debit card being used by the cardholder to engage in the transaction; e) repeating step a) through d) for each transaction the cardholder engages in on the network; and, f) with respect to two transactions engaged in by the cardholder, changing at least one of a location of the keypad (22) on the web page, the geometry of the keypad (22), a size of the buttons (24) and a spacing between neighboring buttons (24).
|
11. A dynamically changing keypad for obtaining a secret code, said keypad comprising:
a plurality of buttons that collectively define a geometry of the keypad, said keypad being employed to enter the secret code via selection of the buttons; and,
a processor for intermittently changing at least one of a size of at least one of the buttons and a spacing between at least two neighboring buttons, wherein the processor is operative to:
i) randomly select the size of at least one of the buttons and/or randomly select the spacing between at least two neighboring buttons;
ii) check whether at least one of the size of at least one of the buttons and the spacing between
at least two neighboring buttons changed between two transactions; and,
iii) repeat steps i) and ii) until at least one of the size of at least one of the buttons and the spacing between at least two neighboring buttons is changed between the two transactions.
3. A method of obtaining a secret code from a user, said method comprising:
a) providing the user with a dynamically generated keypad having a plurality of buttons that collectively define a geometry of the keypad, said keypad being employed by the user to enter the secret code via selection of the buttons; and,
b) intermittently regenerating the dynamically generated keypad, wherein at least one of a size of at least one of the buttons and a spacing between at least two neighboring buttons is changed by:
i) randomly selecting the size of at least one of the buttons and/or randomly selecting the spacing between at least two neighboring buttons;
ii) checking whether at least one of the size of at least one of the buttons and the spacing between at least two neighboring buttons changed between two transactions; and,
iii) repeating steps i) through ii) until at least one of the size of at least one of the buttons and the spacing between at least two neighboring buttons changed between the two transactions.
18. A graphical user interface (GUI) for entering a secret code, said GUI comprising:
a display; and,
a keypad appearing on the display, said keypad including a plurality of buttons that collectively define a geometry of the keypad, said keypad being employed to enter the secret code via selection of the buttons;
wherein the GUI is intermittently varied such that at least one of (a) a size of at least one of the buttons and (b) a spacing between at least two neighboring buttons is changed each time the GUI is varied by:
i) randomly selecting the size of the at least one of the buttons and/or randomly selecting the spacing between the at least two neighboring buttons;
ii) checking whether at least one of the size of at least one of the buttons and the spacing between at least two neighboring buttons changed between two transactions; and,
iii) repeating steps i) through ii) until at least one of the size of at least one of the buttons and the spacing between at least two neighboring buttons changed between two transactions.
1. A method of authenticating debit card transactions engaged in by a cardholder with a merchant on a communications network, said method comprising:
a) establishing a connection over the network to a server of the merchant with a client being used by the cardholder to engage in a transaction on the network;
b) providing over the connection to the client a web page containing a program operative to dynamically generate a keypad having a plurality of buttons that collectively define a geometry of the keypad, said plurality of buttons being dynamically generated and said keypad being employed by the cardholder to enter a personal identification number (PIN) via selection of the buttons with a pointing device of the client;
c) obtaining over the connection the PIN entered by the cardholder;
d) determining if the obtained PIN is correct for a debit card being used by the cardholder to engage in the transaction;
e) repeating step a) through d) for each transaction the cardholder engages in on the network; and,
f) with respect to two transactions engaged in by the cardholder, changing at least one of a size of at least one of the buttons and a spacing between at least two neighboring buttons by:
i) randomly selecting the size of at least one of the buttons and/or randomly selecting the spacing between at least two neighboring buttons;
ii) checking whether at least one of the size of at least one of the buttons and the spacing between at least two neighboring buttons changed between two transactions; and,
iii) repeating steps i) through ii) until at least one of the size of at least one of the buttons and the spacing between at least two neighboring buttons changed between the two transactions.
2. The method of
authenticating the transaction if it is determined that the obtained PIN is correct; and,
not authenticating the transaction if it is determined that the obtained PIN in not correct.
4. The method according to
5. The method according to
transmitting a web page over a communications network to the user, said web page acting as the GUI.
6. The method according to
obtaining over the communications network the secret code enter by the user.
7. The method according to
repeatedly providing the keypad to the user each time the secret code is to be obtained, said changing being carried out between each time the keypad is provided.
8. The method according to
9. The method according to
assigning values to the buttons such that the keypad exhibits an ordered sequential progression of values.
10. The method according to
12. The keypad of
13. The keypad of
14. The keypad of
15. The keypad of
16. The keypad of
17. The keypad of
19. The GUI of
a web page which defines an appearance of the GUI, said web page being transmitted over a communications network to a client including the display such that the GUI is presented by the client for entry of the secret code.
20. The GUI of
21. The GUI of
22. The GUI of
23. The GUI of
24. The method of
25. The method of
prior to step b), providing over the connection to the client a web page containing a web page prompting the cardholder to enter a personal account number (PAN) and/or an expiration date for the PAN;
obtaining over the connection the PAN and/or the expiration date entered by the cardholder;
determining if the obtained PAN and/or the obtained expiration date are correct for the debit card being used by the cardholder to engage in the transaction;
performing step b) through d) if the obtained PAN and/or the obtained expiration date are correct for the debit card being used by the cardholder.
26. The method of
intermittently regenerating the window, wherein a size of the window is changed.
27. The method of
28. The method of
|
This application claims the benefit of U.S. Provisional Application No. 60/354,553, filed Feb. 5, 2002, incorporated herein by reference in its entirety.
The present invention relates to Internet security. It finds particular application in conjunction with the use and protection of a secret personal identification number (PIN) used in an e-commerce debit transaction and will be described with particular reference thereto. However, it is to be appreciated that the present invention is also amenable to other like applications.
Internet commerce, or e-commerce as it is otherwise known, relates to the buying and selling of products and services by consumers and merchants over the Internet or other like transactional exchanges of information. The convenience of shopping over the Internet has sparked considerable interest in e-commerce on behalf of both consumers and merchants. Internet sales, or like transactions, have been typically carried out using standard credit cards such as Visa®, MasterCard®, Discover®, American Express®, or the like, or standard debit cards, i.e., check cards or automated teller machine (ATM) cards which directly access funds from an associated deposit account or other bank account.
While widely used for more traditional face-to-face transactions, use of these standard cards in connection with e-commerce presents certain difficulties, including difficulties concerning authentication or positive identification of the cardholder. For example, maintaining consumer confidence and security has become difficult with increased reports of fraud. The resulting apprehension is also fueled by consumer uncertainty of the reputation or integrity of a merchant with whom the consumer is dealing. The security of the consumer's card information or other personal information typically submitted along with a traditional e-commerce transaction (e.g., address, card number, phone number, etc.) serves to increase apprehension even more. Additionally, cardholders, merchants and financial institutions are all concerned about safeguarding against fraudulent or otherwise unauthorized transactions.
In particular, transactions involving debit cards (i.e., ATM or check cards) generally employ what is known as the PIN to verify the authenticity of the person using the debit card. The PIN is secret number or code known by the card's authorized user(s) but not generally known by others. The use of the otherwise secret PIN in conjunction with debit card transactions provides security against those who may have obtained the card number or Personal Account Number (PAN) without authorization, e.g., through unscrupulous or other means. Typically, the PAN alone (i.e., without the PIN) cannot be used to complete a transaction. That is to say, the debit card typically cannot be used unless the PIN number is also entered for the transaction. In this regard, the PIN number becomes important to providing security against theft or unauthorized charges against the cardholder's account.
Recently, attempts have been made to integrate the ability to use debit cards on web sites for purchasing goods and/or services over the Internet. This typically involves a transaction similar to a standard e-commerce transaction carried out with a credit card; however, the difference, as stated above, is that a debit card transaction also employs the cardholder's PIN in order to complete the transaction. Entry and/or use of the PAN and/or the PIN over an open network (such as the Internet) exposes both to potential security breaches.
For example, the secrecy of PIN codes can be compromised by “spy” software that is able to track a user's “movements” on-line. Generally speaking, spy software allows a third party to unknowingly eavesdrop on a user's Internet session and “watch” the web sites which are visited by the user. The unsuspecting user is often not be aware of the unauthorized third party, which can also observe the user conduct e-commerce transactions. By doing so, the third party is able to view and/or capture PANs, PINs and other information entered by the user. There have been various efforts devoted to thwarting such eavesdropping. One technique, for example, is to have entered keystrokes appear on the screen as asterisks or other indistinguishable characters; however, certain types of spy software can still detect keystrokes even though asterisks are used to disguise the appearance of entered PIN digits or other secret codes.
To address the problem of keystroke monitoring, another technique developed employs a graphical user interface (GUI) and has PAN and PIN numbers entered in a virtual alphanumeric keypad by the use of a mouse or other pointing device. With reference to
The GUI method avoids the problem of someone monitoring keystrokes that are entered by the user. However, sophisticated spy software is also able to track mouse movements and scrolling in order to determine the location of interaction between the cursor, the clicking of the mouse and the content of the web page. Accordingly, by monitoring these activities, patterns can be discerned which may divulge a cardholder's PIN. That is to say, a series of consecutive mouse clicks which reoccur from transaction to transaction at or near the same relative locations can be correlated with the traditional keypad configuration shown in
Accordingly, it would be advantageous to have measures, devices and/or techniques which protect the PAN and/or the PIN, and in particular, which guard the secrecy of the PIN. More specifically, it is desired to have a method for carrying out secured debit card transactions, and, also, generally, any transaction employing a credit or debit card authorization over the Internet or other communications network.
The present invention contemplates a new and improved dynamic PIN pad which overcomes the above-referenced problems and others.
In accordance with one aspect of the present invention, a method is provided for authenticating debit card transactions engaged in by a cardholder on a communications network. The method includes: a) establishing a connection over the network with a client being used by the cardholder to engage in a transaction on the network; b) providing over the connection to the client a web page containing a keypad having a plurality of buttons that collectively define a geometry of the keypad, the keypad being employed by the cardholder to enter a PIN via selection of the buttons with a pointing device of the client; c) obtaining over the connection the PIN enter by the cardholder; d) determining if the obtained PIN is correct for a debit card being used by the cardholder to engage in the transaction; e) repeating step a) through d) for each transaction the cardholder engages in on the network; and, f) with respect to two transactions engaged in by the cardholder, changing at least one of a location of the keypad on the web page, the geometry of the keypad, a size of the buttons and a spacing between neighboring buttons.
In accordance with a more particular aspect of the present invention, the method further includes authenticating the transaction if it is determined that the obtained PIN is correct, and not authenticating the transaction if it is determined that the obtained PIN in not correct.
In accordance with another aspect of the present invention, a method of obtaining a secret code from a user includes providing to the user a keypad having a plurality of buttons that collectively define a geometry of the keypad. The keypad is employed by the user to enter the secret code via selection of the buttons. The method also includes intermittently changing at least one of a location of the keypad, the geometry of the keypad, a size of the buttons and a spacing between neighboring buttons.
In accordance with a more particular aspect of the present invention, the keypad appears on a GUI presented to the user for entry of the secret code.
In accordance with a more particular aspect of the present invention, the method further includes transmitting a web page over a communications network to the user, said web page acting as the GUI.
In accordance with a more particular aspect of the present invention, the method further includes obtaining over the communications network the secret code enter by the user.
In accordance with a more particular aspect of the present invention, the method further includes repeatedly providing the keypad to the user each time the secret code is to be obtained. The changing is carried out between each time the keypad is provided.
In accordance with a more particular aspect of the present invention, the secret code is a PIN for a debit card.
In accordance with a more particular aspect of the present invention, the method further includes assigning values to the buttons such that the keypad exhibits an ordered sequential progression of values.
In accordance with a more particular aspect of the present invention, after the changing the keypad continues to exhibit an ordered sequential progression of values.
In accordance with another aspect of the present invention, a dynamically changing keypad for obtaining a secret code includes a plurality of buttons that collectively define a geometry of the keypad. The keypad is employed to enter the secret code via selection of the buttons, and means are provided for intermittently changing at least one of a location of the keypad, the geometry of the keypad, a size of the buttons and a spacing between neighboring buttons.
In accordance with a more particular aspect of the present invention, the keypad is implemented on a GUI presented for entry of the secret code, the keypad appearing on a display of the GUI.
In accordance with a more particular aspect of the present invention, a web page transmitted over a communications network defines the appearance of the keypad on the GUI's display.
In accordance with a more particular aspect of the present invention, the secret code is a PIN for a debit card, the PIN being collected by the web page over the communications network.
In accordance with a more particular aspect of the present invention, the buttons have values assigned thereto such that the keypad exhibits an ordered sequential progression of values.
In accordance with a more particular aspect of the present invention, after said keypad changes, it continues to exhibit an ordered sequential progression of values.
In accordance with a more particular aspect of the present invention, the keypad changes after each time the secret code is entered therein.
In accordance with another aspect of the present invention, a GUI is provided for entering a secret code. The GUI includes a display, and a keypad appearing on the display. The keypad includes a plurality of buttons that collectively define a geometry of the keypad, and is employed to enter the secret code via selection of the buttons. The GUI is intermittently varied such that at least one of, a location of the keypad within the GUI, the geometry of the keypad, a size of the buttons and a spacing between neighboring buttons, is changed each time the GUI is varied.
In accordance with a more particular aspect of the present invention, the GUI further includes a web page which defines an appearance of the GUI. The web page is transmitted over a communications network to a client including the display such that the GUI is presented by the client for entry of the secret code.
One advantage of the present invention is that exposure of a consumer's PIN over a communications network is reduced or eliminated.
Another advantage of the present invention is that keypad buttons may retain an ordered sequential pattern of values for ease in locating a desired value within the keypad.
Still further advantages and benefits of the present invention will become apparent to those of ordinary skill in the art upon reading and understanding this specification.
The present invention may take form in various components and arrangements of components, and/or in various steps and arrangements of steps. The drawings are only for purposes of illustrating preferred embodiments and are not to be construed as limiting the invention.
With reference to
The client at which the user entering the PIN is stationed includes a monitor or display on which the GUI 20 is presented. Suitably, the client is a computer running an appropriate browser or another similar web-enabled device, and it receives a web page over the network from the server to which the PIN is being transmitted. The web page defines the appearance and/or representation of the GUI 20. That is to say, the server provides the web page over the communications network to the client running the browser when the transaction reaches the point where the cardholder operating the client is to enter their PIN. The entered PIN is then collect via the web page acting as the GUI 20.
As shown, the steps for entering the PIN or other instructions, options, queries and/or other relevant information, etc. are displayed in window 26 during the transaction. In this manner, the GUI 20 appears similar to an ATM terminal. This familiar appearance reduces any potential user confusion and/or eases possible anxiety.
To complete a transaction, the user enters the requested data via the keypad 22 using an appropriate pointer. For example, in the case of a debit card transaction, the user may enter the card's associated PAN, expiration date and PIN on the keypad 22. The entered data is transmitted over the network to the requesting server where it is cross-referenced to a database to verify the user's identity and/or authenticate the transaction. Suitably, the database is maintained by the institution operating the server, e.g., the issuer of the card being used in the transaction or some contracted authenticating party. The database contains the relevant PANs along with their associated PINs. The obtained PIN is checked to see if it matches the PIN on file in the database for the given PAN. In this manner, if there is a match (i.e., the PIN entered/obtained is correct), then the transaction is authenticated, otherwise the transaction is not authenticated.
Periodically, the appearance of the GUI 20 or web page provided for collecting the PIN is changed so that repetitive patterns in the relative locations of mouse clicks or the like cannot be readily discerned and/or related to a particular layout. That is to say, from time-to-time the layout of elements displayed on the GUI 20 change. For example, as the different
Suitably, the overall appearance and/or any one or more of the aforementioned characteristics effecting the same may be randomly generated, e.g., by the server providing the web page, or alternately, by external systems (e.g., computer systems or other random number generating devices). Each of the aforementioned characteristics of the appearance may optionally be based upon a randomly selected number or other randomly generated factor. That is to say, e.g., the spacing between neighboring buttons 24 may be determined by generating a first random number which then becomes the spacing, while the arrangement of the buttons 24 is determined by generating a second random number which identifies a particular arrangement, etc. Optionally, the overall appearance and/or any one or more of the characteristics may cycle or otherwise advance through predetermined settings in a selected or random order. For example, the GUI's appearance may cycle through the layouts shown in
It is to be appreciated, that the PIN may be obtained or otherwise received in a number ways once entered. In one suitable embodiment, the values of selected buttons 24 are returned over the communications network. Alternately, the locations of mouse clicks or the like on the GUI 20 or web page may be captured and returned over the communications network, e.g., as X-Y coordinates or other positional data. In the latter case, the appearance of the GUI 20 or web page is retained or otherwise known by its provider so that the positional data can be associated with the button values corresponding thereto. Optionally, the GUI's appearance or the web page itself and/or information associated with its generation (e.g., sufficient enough to reproduce the appearance) is retained or otherwise known by the provider thereof.
In this manner, a method is provided for securely conducting a PIN-based transaction over the Internet or other open network. The transaction may include, for example, any form of money transfer or payment related to business-to-business (B2B), business-to-consumer (B2C), peer-to-peer (P2P) or government related transactions. While transacting, the cardholder is prompted by the service provider (e.g., the card issuer or some other third party authenticator) to enter their PAN, PIN and optionally the expiration of the card for the purpose of validating and authenticating the user. However, when entered using the dynamically changing GUI 20, patterns of mouse clicks and the like are not always the same even though the PIN or other data being entered remains unchanged. Accordingly, a repetitive pattern for PIN entry does not develop which could otherwise be linked to a traditional keypad layout to uncover the PIN.
In a suitable embodiment, an ActiveX or Java plug-in is employed for implementation. However, it is to be appreciated that implementation may also take the form of any appropriate software, hardware, firmware or some combination thereof. Security is further enhanced by encrypting the data before transmitting it over the network to the receiving server using a secure socket layer (SSL). For example, the PIN (and if desired the PAN) can be encrypted using public/private key pairs as are known in the art. The distribution of a public key to clients is optionally embedded in and/or transmitted with the web page defining the GUI 20, and the private key is stored at a suitable location. The public/private key pair is used to generate a session key employed to carry out the desired encryption. To further strengthen security the public/private key pair is also changed periodically.
The PAN and/or expiration date are not usually strictly secret in the same manner as the PIN. Accordingly, the cardholder may be presented with a first web page that is provided by the server, which prompts them to enter their PAN and select the appropriate expiration date. The PAN and expiration data are transmitted to the server and validated. Upon successful validation (i.e., it is a legitimate PAN having the enter expiration data), the cardholder is then provided with the aforementioned GUI 20 (e.g., via a second separate web page) for entering their PIN. The user inputs their PIN using the button icons 24 of the keypad 22 and the PIN is transmitted over the network to the server for authentication. By separating the PAN entry and transmission from PIN entry and transmission, the likelihood of an unauthorized third party intercepting and correlating both pieces of information is reduced.
Optionally, in order to conduct an e-commerce transaction using a debit or credit card, the consumer initially proceeds through the same process as per a standard e-commerce credit card transaction. Namely, the consumer may choose selected goods or services from a merchant's web page and place them into a virtual shopping cart or the like. When he is done shopping, the consumer continues to a check-out process where pertinent information as to the consumer's billing and shipping information can be entered. The consumer may also enter information concerning the card or account. Such information may include the type of card (Visa®, MasterCard®, Discover®, American Express®, or the like), the consumer's name as listed on the card, the card number, any security codes listed on the card and/or the expiration date of the card. For a debit card transaction, in addition to the above information, the consumer would also enter a PIN using the dynamically changing GUI 20 in order to complete the transaction.
In one suitable embodiment, the buttons 24 are assigned a standard set of alphanumeric values (e.g., like an ATM or telephone keypad) for each transaction such that the values assigned to the buttons 24 remain in sequential order for their relative positions in the keypad 22, e.g., as shown in
In alternate embodiments, the individual button location and size is varied or changed from session to session. Additionally, the assignment of values to the buttons 24 may be random or otherwise non-sequential (e.g., see
The various layouts shown in
With particular reference to
An advantage of having varying locations of the keypad buttons 24 is that the numbering or assignment of selected values thereto can still be maintained in an organized fashion if desired. For example, in
Of course, additional security measures can be taken in conjunction with the measures described herein for securely conducting e-commerce transactions using a debit or credit card. For example, consumer education via messaging to consumers through the window 26 or otherwise can direct the consumer to view the provider's server certificate. If the name on the certificate does not match that of the service provider, the consumer is instructed to terminate the transaction and report the incident. Additionally, providers can recognize certain merchants, initially merchant acceptance can be limited to a few select merchants, which hinder attempts by unauthorized third parties and hackers to create bogus merchants. Further security measures include a merchant portal listing of all approved merchants with links to their web sites to avoid the risk presented by bogus merchants.
Another optional security measure to be used is to implement global Internet scanning. To detect hackers who are presenting bogus merchants and GUIs, global Internet scanning services offered by Internet security firms can be utilized. The global Internet scanning services will search for specific parameters provided for the search, monitor traffic patterns to detect abnormal access activities, scan for familiar domain names, and so on. This approach provides a security measure to prevent or track any website presenting a similar looking GUI application that is unauthorized. Further, the service provider can also register a combination of domain names similar to the one used for presenting the GUI 20. This counter measure also acts as a potential deterrent against hack attempts that use similar domain names to confuse consumers into engaging in an e-commerce transaction.
Yet another optional security measure is the use of access devices that can recognize authenticated parties. The consumer access device, which can be a personal computer, personal digital assistant, mobile phone, etc., preferably has the ability to recognize participating business, government agencies, financial institutions, merchants, etc., based on a unique secret identifier known only between the consumer access device and the participating entity. The unique secret identifier can take the form, for example, of an EMBED Tag within the participating entity's web page. If a non-participating entity attempts to impersonate a valid participant, software on the consumer access device is able to recognize the impersonation and display a message to the user to terminate the transaction.
For purposes of the present application, the terms “consumer”, “cardholder” and “user” will at times be used interchangeably. Similarly, the term “PIN” specifically denotes a personal identification number for a debit card, however, more generally, it may be used to refer to any like code or alphanumeric string, the identity of which is desired to be kept secret or confidential. Additionally, the arrangement or configuration of the keypad is defined by the relative positions of the buttons themselves irrespective of their assigned values. That is to say, the arrangement or configuration of the keypad refers to its collective geometry, including its overall size and/or shape.
The invention has been described with reference to the preferred embodiments. Obviously, modifications and alterations will occur to others upon a reading and understanding of this specification. It is intended that the invention be construed as including all such modifications and alterations insofar as they come within the scope of the appended claims or the equivalents thereof.
Sherwin, Francis M., Keresman, III, Michael A., Balasubramanian, Chandra, Lazzaro, John R.
Patent | Priority | Assignee | Title |
10102366, | Apr 25 2012 | Arcanum Technology LLC | Fraud resistant passcode entry system |
10158773, | Jul 30 2015 | Kyocera Document Solutions Inc | Input device |
10185703, | Feb 20 2012 | WIX COM LTD | Web site design system integrating dynamic layout and dynamic content |
10366215, | Jul 20 2012 | LICENTIA GROUP LIMITED; MYPINPAD LIMITED | Authentication method and system |
10565359, | Jul 20 2012 | LICENTIA GROUP LIMITED; MYPINPAD LIMITED | Authentication method and system |
10565569, | Jul 30 2015 | LOGICMARK, INC | Methods and systems related to multi-factor, multidimensional, mathematical, hidden and motion security pins |
10572648, | Apr 25 2012 | Arcanum Technology LLC | Fraud resistant passcode entry system |
10592653, | May 27 2015 | LICENTIA GROUP LIMITED; MYPINPAD LIMITED | Encoding methods and systems |
10740449, | May 27 2015 | LICENTIA GROUP LIMITED; MYPINPAD LIMITED | Authentication methods and systems |
10789412, | Feb 20 2012 | WIX COM LTD | System and method for extended dynamic layout |
11036845, | May 27 2015 | LICENTIA GROUP LIMITED; MYPINPAD LIMITED | Authentication methods and systems |
11048783, | Jul 20 2012 | LICENTIA GROUP LIMITED; MYPINPAD LIMITED | Authentication method and system |
11048784, | Jul 20 2012 | LICENTIA GROUP LIMITED; MYPINPAD LIMITED | Authentication method and system |
11048790, | May 27 2015 | LICENTIA GROUP LIMITED; MYPINPAD LIMITED | Authentication methods and systems |
11194892, | Jul 20 2012 | LICENTIA GROUP LIMITED; MYPINPAD LIMITED | Authentication method and system |
11449661, | Feb 20 2012 | Wix.com Ltd. | System and method for extended dynamic layout |
11720739, | Feb 20 2012 | Wix.com Ltd. | System and method for extended dynamic layout |
8484480, | Jul 08 2008 | ADVANCED NEW TECHNOLOGIES CO , LTD | Transmitting information using virtual input layout |
8640252, | May 07 2012 | FINJAN BLUE, INC | Obfuscating entry of sensitive information |
8776200, | Mar 14 2011 | Method for inputting a password into an electronic terminal | |
8836473, | Apr 05 2012 | Bank of America Corporation; Bank of America | Dynamic keypad and fingerprinting sequence authentication |
8910861, | Apr 05 2012 | Bank of America Corporation; Bank of America | Automatic teller machine (“ATM”) including a user-accessible USB port |
9196111, | Jan 04 2011 | Bank of America Corporation | Automated teller machine (“ATM”) dynamic keypad |
9214051, | Jan 04 2011 | BANK OF AMERICA COPORATION | Dynamic touch screen for automated teller machines (“ATMs”) |
9280656, | Nov 16 2012 | UNIVERSITY-INDUSTRY FOUNDATION, YONSEI UNIVERSITY; INDUSTRY-ACADEMIA COOPERATION GROUP OF SEJONG UNIVERSITY | Device and method for providing security channel interface |
9424700, | Mar 25 2014 | SPECTRUM BRANDS, INC | Electronic lock having usage and wear leveling of a touch surface through randomized code entry |
9519769, | Jan 09 2012 | SENSIBLE VISION, LLC; SENSIBLE VISION, INC | System and method for disabling secure access to an electronic device using detection of a predetermined device orientation |
9552465, | Jul 20 2012 | LICENTIA GROUP LIMITED | Authentication method and system |
9594894, | Aug 24 2012 | SENSIBLE VISION, INC | System and method for enabling a camera used with an electronic device using detection of a unique motion |
9639840, | Mar 10 2014 | PANASONIC INTELLECTUAL PROPERTY MANAGEMENT CO., LTD. | Information processing device and information processing method |
Patent | Priority | Assignee | Title |
5949348, | Aug 17 1992 | NCR Corporation | Method and apparatus for variable keyboard display |
6209104, | Dec 10 1996 | ACCULLINK, INC | Secure data entry and visual authentication system and method |
6434702, | Dec 08 1998 | LinkedIn Corporation | Automatic rotation of digit location in devices used in passwords |
6549194, | Oct 01 1999 | HEWLETT-PACKARD DEVELOPMENT COMPANY, L P | Method for secure pin entry on touch screen display |
6718471, | Mar 31 1998 | Fujitsu Limited | ELECTRONIC INFORMATION MANAGEMENT SYSTEM, IC CARD, TERMINAL APPARATUS AND ELECTRONIC INFORMATION MANAGEMENT METHOD, AND RECORDING MEDIUM ON WHICH IS RECORDED AN ELECTRONIC INFORMATION MANAGEMENT PROGRAM |
6720860, | Jun 30 2000 | SNAP INC | Password protection using spatial and temporal variation in a high-resolution touch sensitive display |
WO118719, | |||
WO118720, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Feb 05 2003 | CardinalCommerce Corporation | (assignment on the face of the patent) | / | |||
May 25 2003 | LAZZARO, JOHN R | CARDINAL COMMERCE CORPORATION | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 014145 | /0707 | |
May 27 2003 | SHERWIN, FRANCIS M | CARDINAL COMMERCE CORPORATION | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 014145 | /0707 | |
May 28 2003 | KERESMAN, III, MICHAEL A | CARDINAL COMMERCE CORPORATION | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 014145 | /0707 | |
May 28 2003 | BALASUBRAMANIAN, CHANDRA | CARDINAL COMMERCE CORPORATION | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 014145 | /0707 |
Date | Maintenance Fee Events |
Jan 27 2015 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Jan 28 2019 | M1552: Payment of Maintenance Fee, 8th Year, Large Entity. |
Jan 20 2023 | M1553: Payment of Maintenance Fee, 12th Year, Large Entity. |
Date | Maintenance Schedule |
Aug 02 2014 | 4 years fee payment window open |
Feb 02 2015 | 6 months grace period start (w surcharge) |
Aug 02 2015 | patent expiry (for year 4) |
Aug 02 2017 | 2 years to revive unintentionally abandoned end. (for year 4) |
Aug 02 2018 | 8 years fee payment window open |
Feb 02 2019 | 6 months grace period start (w surcharge) |
Aug 02 2019 | patent expiry (for year 8) |
Aug 02 2021 | 2 years to revive unintentionally abandoned end. (for year 8) |
Aug 02 2022 | 12 years fee payment window open |
Feb 02 2023 | 6 months grace period start (w surcharge) |
Aug 02 2023 | patent expiry (for year 12) |
Aug 02 2025 | 2 years to revive unintentionally abandoned end. (for year 12) |